Probabilistic encryption

Results: 76



#Item
21Key / Probabilistic encryption / Symmetric-key algorithm / Message authentication code / Digital signature / ID-based encryption / Integrated Encryption Scheme / Cryptography / Key management / Public-key cryptography

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

Add to Reading List

Source URL: www.zurich.ibm.com

Language: English - Date: 2005-09-02 12:11:39
22Optimal asymmetric encryption padding / Chosen-ciphertext attack / Chosen-plaintext attack / Signcryption / Cipher / Symmetric-key algorithm / RSA / Probabilistic encryption / Semantic security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

Committing Encryption and Publicly-Verifiable SignCryption Yitchak Gertner Amir Herzberg

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-17 04:10:40
23Computational complexity theory / Zero-knowledge proof / Proof of knowledge / IP / Soundness / NP / Quadratic residue / Probabilistic method / Mathematical proof / Theoretical computer science / Cryptography / Cryptographic protocols

Lecture 17 - Zero Knowledge Proofs Boaz Barak April 5, 2010 Review connections between: pseudorandom generators, one-way functions, pseudorandom functions, CPA secure symmetric encryption, message authentication codes, C

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-05 00:17:40
24Ciphertext indistinguishability / RSA / Probabilistic encryption / Oblivious transfer / IP / Index of cryptography articles / Blum–Goldwasser cryptosystem / Cryptography / Electronic commerce / Public-key cryptography

Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-07 00:42:30
25Verifiable secret sharing / Gödel Prize / Interactive proof system / Claude Crépeau / Pseudorandom function family / Probabilistic encryption / Oblivious transfer / Zero-knowledge proof / Provable security / Cryptography / Cryptographic protocols / Silvio Micali

Curriculum Vitae Silvio Micali Ford Professor of Engineering Electrical Engineering and Computer Science Department Stata Center, Room G644, 32 Vassar Street, Cambridge, MA5949

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2015-04-22 20:29:48
26Message authentication codes / Digital signature / Cryptographic hash function / Cryptographic primitive / RSA / Key / Probabilistic encryption / Block cipher / Galois/Counter Mode / Cryptography / Public-key cryptography / Key management

Abstract appearing in Proceedings of the 27th ACM Symposium on the Theory of Computing, MayIncremental Cryptography and Application to Virus Protection Mihir Bellare∗

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2004-08-02 17:51:17
27Block cipher / Stream cipher / Chosen-ciphertext attack / Cipher / Chosen-plaintext attack / Transport Layer Security / RSA / Ciphertext stealing / Probabilistic encryption / Cryptography / Block cipher modes of operation / Padding

Security Flaws Induced by CBC Padding Applications to SSL, IPSEC, WTLS... Serge Vaudenay Swiss Federal Institute of Technology (EPFL)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-30 18:34:48
28Ciphertext indistinguishability / Deniable encryption / Semantic security / Public-key cryptography / Applied mathematics / Cipher / Probabilistic encryption / Cryptography / Cyberwarfare / Security

On the Impossibility of Sender-Deniable Public Key Encryption Dana Dachman-Soled? Microsoft Research New England Abstract. The primitive of deniable encryption was first introduced by Canetti et al. (CRYPTO, Denia

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-28 09:46:16
29Block cipher modes of operation / Block cipher / Cipher / Probabilistic encryption / RSA / Padding / Cryptography / Authenticated encryption / Initialization vector

Automated Analysis and Synthesis of Block-Cipher Modes of Operation Alex J. Malozemoff Jonathan Katz

Add to Reading List

Source URL: www.cs.umd.edu

Language: English - Date: 2014-05-16 05:57:05
30Homomorphic encryption / ElGamal encryption / Probabilistic encryption / Blind signature / Encryption / Ciphertext / Goldwasser–Micali cryptosystem / Cipher / Zero-knowledge proof / Cryptography / Public-key cryptography / Paillier cryptosystem

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
UPDATE